How To Secure A Massive Storage System On A Huawei Server (Uds)
|
|
|
- Justina Norman
- 5 years ago
- Views:
Transcription
1 HUAWEI OceanStor UDS Massive Storage System V100R002C01 Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
2 Copyright Huawei Technologies Co., Ltd All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Website: Huawei Industrial Base Bantian, Longgang Shenzhen People's Republic of China i
3 Security Technical White Paper Contents Contents 1 Overview Introduction to the UDS Security Threats to the UDS UDS Security Solution Overall Security Architecture of the UDS Device Security Network Security Service Security Management Security Security Assurance Security Statement and Certificates Security Assurance Process Glossary ii
4 Figures Figures Figure 1-1 UDS system architecture... 5 Figure 2-1 UDS security solution architecture... 8 Figure 2-2 UDS logical network Figure 2-3 AK/SK authentication process Figure 2-4 UDS slice storage process Figure 3-1 Huawei IPD security assurance process iii
5 Overview 1 Overview 1.1 Introduction to the UDS HUAWEI OceanStor UDS Massive Storage System (the UDS) is a cloud storage product. Cloud storage is an innovative storage service that provides cost-efficient and on-demand storage resources for users and third parties. Users can utilize cloud storage resources without purchasing any storage equipment, and they are charged only at the data volume that they have used. A cloud storage system provides various interfaces for different application scenarios such as object storage, block storage, and file storage. Figure 1-1 shows the UDS system architecture. The UDS is a distributed object-based storage system with high scalability and large capacity. It provides object storage interfaces and supports various applications including unstructured data storage (for example, web disks), cloud backup, and cloud archiving. The UDS consists of two internal clusters: an access cluster made of access nodes (A-Nodes) and a storage cluster made of universal distributed storage nodes (UDSNs). The access cluster provides access interfaces for the external and the storage cluster implements data storage. Users' data objects are divided into slices of a specific size and evenly allocated to the smart disks on UDSNs. Each data slice has multiple copies for high data reliability. 4
6 Overview Figure 1-1 UDS system architecture 1.2 Security Threats to the UDS Traditional Security Threats 1. Security threats from the Internet include: Traditional network IP attacks: port scanning, IP address spoofing, Land attacks, IP option attacks, IP route attacks, IP fragment packet attacks, and teardrop attacks Bugs of operating systems and software Many bugs that can reduce system security are hidden in computer software, including thirdparty software, business software, and open-source software. Hackers can control operating systems and do anything at will by manipulating errors in programming or context dependency relationship. Common bugs in operating systems and software include cache overflow, privilege abuse, and download of code that does not pass completeness tests. Viruses, Trojan horses, and worms SQL injection attack Attackers inject SQL commands to entry fields of web sheets or query character strings of page requests to enable servers to execute malicious SQL commands. In some sheets, contents entered by users are directly used to generate (or influence) dynamic SQL commands, or those contents are used as storage parameters. Those sheets are prone to the SQL injection attack. Phishing attack The phishing attack is a process in which attackers disguise themselves as trusted legal entities to obtain personal information such as user names, passwords, and credit card details 5
7 Overview through electronic communication, for example, or instant messages. Those s or instant messages usually claim that they are sent by famous social networking sites, auction websites, network banks, e-payment websites, or network administrators to win trust. Zero-day attack Nowadays, it takes a very short time for hackers to detect and utilize security vulnerabilities. If a vulnerability is maliciously used to initiate attacks within 24 hours after it is disclosed, the vulnerability is zero-day vulnerability and those attacks are zero-day attacks. To fix a vulnerability, vendors need to confirm the vulnerability existence, assess risks, work out fixing methods, verify fixing methods, and evaluate the fixing effect. The process takes some time. Therefore, vendors can hardly develop a patch for a vulnerability on the same day when it is disclosed. Without a patch and risk awareness, users may suffer great loss caused by zeroday attacks. Storage Security Threats 2. Security threats from intranets include: Fast-changing attacks, endangering intranet security Intranet hosts under new attacks, such as ARP spoofing and malicious add-ins, may be planted with Trojan horses or other malicious programs and become zombies controlled by hackers. Hackers can use zombies to attack other devices over intranets and steal commercial secrets. Zombies may be used as distributed denial of service (DDoS) tools to send lots of attack packets. Untimely patch upgrade and antivirus library update, leaving loopholes to attackers If the latest patches are not installed on devices and hosts running on different platforms, software configurations of hosts and devices have defects, antivirus libraries are not updated in a timely manner, or the update of antivirus libraries lags behind the emergence of new viruses, viruses and worms may spread. The worm outbreak may paralyze intranets and interrupt services. Illegitimate access to the Internet, causing frequent leakage of internal confidential information If employees of an enterprise access the Internet through telephone dial-up, virtual private network (VPN) dial-up, and general packet radio system (GPRS) dial-up, firewalls cannot monitor the access. As a result, IT resources on the intranet of the enterprise are exposed to hackers. Dial-up Internet connections may open the door for attackers and viruses, and give channels for employees to leak commercial secrets. Illegitimate Internet access brings great loss to enterprises, but evidence is difficult to obtain. Loose management of peripherals, leaking data and spreading viruses Peripherals, such as USB disks, CD-ROMs, printing devices, infrared ports, serial ports, and parallel ports, are important channels for data communication. Since those peripherals are easy to use, they have become main sources of data leakage and virus spreading in recent years. Peripherals, especially USB ports, cannot be effectively managed through port sealing or rigid regulations. Therefore, technical measures are in urgent need to flexibly manage peripherals. Storage security must be safeguarded by technical measures. Storage resources and data must be protected from unauthorized access. Data security is particularly important for cloud storage due to the features of cloud storage. The UDS provides standard S3 object-based 6
8 Overview storage interfaces to offer services to the external, achieving mass data storage. The following describes some typical service security threats and challenges to the UDS: 1. Security threats to data transfer Although data can be encrypted during transfer, the data must be decrypted before being processed in the cloud. All data being processed is not encrypted. Most web applications do not use HTTPS and are performance- and bandwidth-intensive. Therefore, there are eavesdropping risks when data is being transferred from users' terminals to the cloud data center. 2. Security threats to static data Static data can be encrypted before storage. For example, users can encrypt data of simple object storage services on clients and then store the encrypted data to the public cloud. The encryption keys are stored in the clients and cannot be obtained from the cloud for data decryption. This method is secure. However, this method limits the data processing in the cloud and applies only to simple storage services in the cloud. Storing keys in the cloud or a third-party organization requires more strict security management measures in privacy and security. In multi-tenant applications, if users' data is incorrectly isolated, access-controlled, or authorized, data leakage may occur. Furthermore, storage medium damage or unexpected power failures may cause data loss. 3. Data origination proof Data origination is different from data integrity protection. Data integrity protection only proves that data is not tampered maliciously or unintentionally. Data origination contains not only data itself, but also the environment that the data relies on. In different environments, the data meaning may be different. The data origination technology can trace the original data and derived data in a storage system. It has the following functions: Assesses data quality and reliability. Queries the data source, and audits and traces the data source when necessary. Reproduces the data generation, reconstruction, and test processes, facilitating data sharing and process optimization. Protects the copyright and intellectual property rights of data management. Quickly locates faults, analyzes fault causes, and determines the personnel responsible for fault rectification. Explains the cause of current data status. In the cloud environment, the environment on which data depends varies according to the data migration and distributed processing, which poses a much more serious challenge on the proof of data origination than traditional methods. 4. The UDS storage services must comply with related laws and regulations. For example, the Regulatory Compliance of Data Storage of European Union specifies that some information must be physically stored in its own nation. 7
9 2 UDS Security Solution 2.1 Overall Security Architecture of the UDS To fight against the security threats and risks facing the UDS, a comprehensive security solution is available to safeguard the UDS from four security dimensions. Figure 2-1 shows the overall architecture of the security solution. Management security protects the security of these four dimensions. Figure 2-1 UDS security solution architecture Device security Operating system hardening Patch management System antivirus Web security Network security Plane isolation Channel security Firewall Service security Transfer security Data integrity Identity authentication Data access control Data confidentiality Management security Log management Password management Role management Permission management Audit support 8
10 2.2 Device Security Operating System Hardening Security Patches As we have mentioned before, the UDS consists of UDSNs (creating a storage cluster) and A- Nodes (creating an access cluster). The UDSN operating system inherits security compliance from the Huawei hardware platform. The security of the A-Node operating system is specially hardened from the following aspects: 1. Simplified operating system. The "minimum operating system", that is, the operating system with only necessary components to meet service requirements is installed. By default, when an operating system is installed, many services and components are simultaneously installed. However, a large part of these services and components are unnecessary and will compromise system performance and affect the security of the operating system. Therefore, unnecessary services and components must be removed based on site requirements to improve the startup speed and system security without affecting the operating system's support for normal services and existing features. The UDS operating system simplification principle is that only modules and services required for service loading are initially installed, and the kernel configuration file is downsized as well. After the simplification, the file system volume is greatly reduced, minimizing the threats and risks to the operating system. 2. Operating system security configuration. Incorrect operations and configurations, insecure accounts and passwords, unnecessary services, software, and ports, as well as uncontrolled sharing open the door for viruses, hackers, worms, and Trojan, and expose the storage system to security threats and risks. Correct operating system security configuration can reduce the previous threats. The surveys conducted by the Center for Internet Security (CIS) show that the basic security configuration can eliminate 80% to 90% known vulnerabilities, which cannot be achieved by installing antivirus software and security patches. The security configuration principles for the A-Node operating system include the following: Password security: Unnecessary users and user groups must be deleted. The complexity, length, and validity period of passwords must comply with specific requirements. Passwords must be changed within a specific period. System service security: Insecure services such as Telnet, Simple Network Management Protocol (SNMP V1 or V2), and Network File System (NFS), and unnecessary or risky background processes and services must be disabled. The communications and transfer protocols must be secure, such as Secure Shell (SSH). Operating system kernel security: Execution stacks are protected against buffer overflow attacks. Functions such as IP address forwarding, response to broadcast requests, and Internet Control Messages Protocol (ICMP) redirection requests receiving are disabled. IP address spoofing prevention is available. Socket sequences are guarded against attacks. File and directory permissions: Permissions for files and directories must be strictly limited. Logs and auditing: The run logs of services and kernel processes must be recorded. Log servers can be connected to the UDS. Deletion of files without owners: Idle links and globally writable files are not allowed in the operating system. Due to internal design defects, software has various vulnerabilities. Customers need to periodically install security patches to fix these vulnerabilities and prevent viruses, worms, 9
11 Antivirus Web Security and hackers. Huawei updates security patches every half a year or upon emergency vulnerabilities. The UDS uses the previous patching policy and provides security patches for users based on their requirements. The UDS software (including the operating system) has been scanned for viruses before release, and the released UDS software (including the operating system) is guaranteed to contain no virus. The UDS provides the following functions to protect web security: 1. Uses mainstream web security scanning software to scan the UDS web server and web applications, eliminating highly-risky security vulnerabilities. 2. Supports HTTPS access, enhancing access security. 3. Provides service interfaces that can identify attacks and implement the punishment of users who frequently send error requests to prevent malicious error requests from using up system resources and eliminate brute force attacks. 4. Supports background verification, anti-malicious code, anti-sql injection, and cross-site script attack prevention. 2.3 Network Security Plane Isolation The UDS logical network is divided into a service plane, storage plane, and management plane, which reside on different VLANs for security isolation. The jobs of these planes are as follows: 1. The service plane is a network plane for cloud storage to provide storage interfaces externally and for communicating with external devices. 2. The storage plane is a network plane for the internal communication and for the management and data communication among internal nodes. 3. The management plane is a channel for administrators and maintenance engineers to access storage management systems. Figure 2-2 shows the UDS logical network. 10
12 Figure 2-2 UDS logical network Channel Security Firewall 1. Secure transmission protocols, such as SSH and HTTPS, are used for remote system management. 2. The external APIs provided by the UDS support SSL authentication and encryption, preventing data interception and tampering. The UDS egresses employ firewalls (as shown in Figure 2-2) to defend against DDoS attacks and hide the internal network. The firewalls allow only necessary ports to be opened for external services. Therefore, the management ports cannot be accessed from the service plane. 2.4 Service Security Data transfer Identity authentication The UDS provides Amazon-compatible S3 APIs. Users can use a Huawei or third-party terminal tool to upload user data to the cloud object-based storage system. Data is encrypted by SSL during transfer. The UDS uses access key (AK) and secret key (SK) to authenticate user identities. During the authentication, the keyed-hash message authentication code algorithm (HMAC) is performed. During the HMAC algorithm, a key and a message are input and a message summary is output. Each client user has a pair of AK and SK. The AK is public and identifies a unique user. The SK is used for calculating signatures. Client users must keep the SK safe. An operation request sent by a client user contains the user's AK and a signature calculated by the SK (the 11
13 signature is calculated using the HMAC-SHA1). Upon receiving the request, the UDS checks the AK and SK stored on it and calculates a signature using the SK. Then the UDS compares the obtained signature with the one in the request. If the two signatures are consistent, the authentication succeeds. Figure 2-3 AK/SK authentication process Access control on objects and buckets Static data confidentiality The UDS provides a flexible and secure data access mechanism that allows customers to set different access control policies based on bucket and object configurations. Available access control policies are: READ, WRITE, READ_ACP (users are granted the permission to read the access control policy), WRITE _ACP (users are granted the permission to write the access control policy), and FULL_CONTROL. Object data uploaded to the UDS is stored in slices and then randomly distributed to smart disks of UDSNs. The maximum size of each slice is 1 MB, as shown in Figure 2-4. Therefore, even though a disk is stolen, the data cannot be restored. Users can also encrypt data before uploading it to the UDS. In this scenario, the keys are managed on the clients. Figure 2-4 UDS slice storage process 12
14 Data integrity Data durability The UDS uses digital signatures to ensure data integrity during transfer. The integrity of a data slice is automatically verified by the UDS and the integrity verification of a data object must be supported by client applications. The process of object integrity verification is as follows: Uploading an object (PUT) A. The client invokes an interface for uploading the object. You can add the 128-bit MD5 summary of the object to the request header field. The A-Node receives the object, computes the MD5 value of the object, and compares the value with that in the request. If the two values are inconsistent, the service node returns an error message. Downloading an object (GET) A. The client invokes an interface for obtaining the object. B. The A-Node returns the object and the MD5 value (ETag value of the header field) of the object. C. The client computes the MD5 value of the object and compares the value with that returned by the A-Node. If the two values are consistent, the data is correct and the object is successfully downloaded. The integrity of a data slice is verified using the cyclic redundancy check (CRC) consistency verification algorithm. When writing slice data into a smart disk, the A-Node uses the specified CRC algorithm to compute the verification value of the slice data and stores both the verification value and slice data into the smart disk. When reading slice data, the A-Node computes the CRC verification value of the slice and compares the verification value with that returned by the A-Node. The data can be read only when the two values are consistent. This mechanism not only prevents data damage in data storage and transfer, but also protects data from malicious tampering by employees of cloud storage service providers, improving data security. The UDS provides % data availability and % data durability. These indicators are the basic standards. The actual data availability and durability vary according to the number of copies, object size, disk type, and the application of multiple data centers (MDC). The redundancy design and high-quality hardware types can improve data reliability. 2.5 Management Security Log management The UDS supports the following logs: Operation logs Operation logs record management and maintenance operations performed on the management plane, including users, operation types, client IP addresses, key parameters, operation time, and operation results. The operation logs are stored in the database of the A-Node. Auditors can export and view operation logs on the OceanStor DeviceManager and periodically audit operations performed by operation and maintenance personnel to find out improper or 13
15 malicious operations in a timely manner. Operation logs can be used to prevent repudiation and must be stored for at least 12 months (when the disk space is sufficient). Run logs Run logs record the running status of each node and have four levels: debug, info, warning, and error (arranged in ascending order of priority). Log levels can be used to control log output. Run logs of each node are summarized using the rsyslog component. In addition, the rsyslog component can filter out the logs of the debug and info levels. As a result, high-level logs (logs of the warning and error levels) and complete logs (including all log packages whose output level has been set) are obtained. High-level logs are periodically summarized and stored in the log server through FTP. Complete logs are stored in the local storage devices. Users can upload complete logs of a specific node in a specific period of time to the log server using the script. Run logs contain log levels, thread names, and running information. Administrators can view run logs to learn about and analyze the running status of a system, and then find out and handle exceptions and faults in a timely manner. Run logs must be stored for at least 3 months (when the disk space is sufficient). Black box logs Password management Black box logs record fault information when serious system faults occur and are used for fault diagnosis and rectification. Black box logs of UDSNs are stored in local storage devices. Central password change for internal accounts The UDS provides a unified platform to centrally change the passwords of internal accounts. Only the super administrator has the permission to access the platform and perform related operations. The system can check the password complexity. Account hardening The UDS locks out an account after incorrect password retries and prevents brute-force cracking attacks. Password hardening A password can be changed upon an initial login and has a fixed validity. This mechanism prevents a password from being used for a long period of time. The mechanism forcibly generates and saves passwords, avoiding the cracking, leakage, and illegitimate use of passwords. Encrypted password transfer and storage When the passwords of internal accounts are changed on the management platform, the new passwords are encrypted and transferred to each A-Node. On the management platform and A-Nodes, the passwords must be encrypted before being stored. Operation logs of internal accounts The internal account management platform records all operations on the passwords of internal accounts in logs, which can help users locate faults and implement audit 14
16 Role management Permission management Audit support User management provides security management based on user, user group, and permission. In user management mode, the role of a user determines the permission of the user. If the permission of a user needs to be changed based on site requirements, a different role can be assigned to the user. User information permissions are controlled by role. Users can access only the data that they have permissions for. The output logs cover the management and service planes. Their contents are accurate and they allow secure access and storage. 15
17 3 Security Assurance 3.1 Security Statement and Certificates With profound understanding of the importance of security for customers and products, Huawei actively promotes the research and development (R&D) of secure products. In July 2004, Huawei obtained certificate BSS7799. In August 2007, the certificate was updated to ISO/IEC Huawei integrates security assurance into its Integrated Product Development (IPD) process. Security issues involved in product functions and qualities are deliberated in each phase, such as concept, design, verification, and installation, throughout the product life cycle. Besides, Huawei sets up a Technology Management Group (TMG) to monitor and guide security activities during the product development. The TMG provides consulting and assessment for the development of professional security solutions. For details about Huawei's security policies and laws compliance, see Huawei Network Security White Paper and Network Security Laws Compliance Manual. 3.2 Security Assurance Process Customers are attaching great importance to product security. A single accident may result in absolute failure. The most effective way to ensure the product security is to follow a correct methodology throughout the R&D process of products. Figure 3-1 shows the process that Huawei adopts during its product development process. 16
18 Figure 3-1 Huawei IPD security assurance process Huawei builds a professional security team to provide advanced security solutions for customers. Besides, the team provides support, guidance, and monitoring in security issues of all products. Within the product lines and product development teams, Huawei has dedicated teams and roles be responsible for security issues and ensure the product security. Every year, each product teams adjust their short-term and long-term security plans based on the industrial development and service changes. Besides, the quality assurance (QA) department is responsible for auditing the security plans and execution progress. With its professional teams and strict process management, Huawei meets the security requirements of every customer, and provides them sustainable and high-quality security assurance. 17
19 4 Glossary Acronym and Abbreviation UDS AK SK HTTPS S3 Full Spelling UDS massive storage system Access Key ID Secret Access Key Hypertext Transfer Protocol over Secure Socket Layer Amazon S3 18
HUAWEI 9000 HD Video Endpoint V100R011. Security Maintenance. Issue 02. Date 2013-05-28 HUAWEI TECHNOLOGIES CO., LTD.
V100R011 Issue 02 Date 2013-05-28 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent
OceanStor UDS Massive Storage System Technical White Paper Reliability
OceanStor UDS Massive Storage System Technical White Paper Reliability Issue 1.1 Date 2014-06 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
HUAWEI USG2000&5000 Series Unified Security Gateway Content Filtering White Paper
Doc. code HUAWEI USG2000&5000 Series Unified Security Gateway Content Filtering White Paper Issue 1.0 Date 2014-08-21 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2012. All rights
HUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD.
HUAWEI OceanStor 9000 Load Balancing Technical Issue 01 Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may be
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
GiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Eudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD.
HUAWEI TECHNOLOGIES CO., LTD. Product Overview The Eudemon1000E series product (hereinafter referred to as the Eudemon1000E) is a new generation of multi-function security gateway designed by Huawei to
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
Codes of Connection for Devices Connected to Newcastle University ICT Network
Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Secospace elog. Secospace elog
Secospace elog Product Overview With the development of networks, security events continually occur on hosts, databases, and Web servers. These range from Trojans, worms, and SQL injections, to Web page
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Catapult PCI Compliance
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
Network Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
How To Create A Network Access Control (Nac) Solution
Huawei Terminal Security Management Solution Create Enterprise Intranet Security Terminal Security Management Solution 01 Introduction According to the third-party agencies such as the Computer Security
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
Overview of Banking Application Security and PCI DSS Compliance for Banking Applications
Overview of Banking Application Security and PCI DSS Compliance for Banking Applications Thought Paper www.infosys.com/finacle Universal Banking Solution Systems Integration Consulting Business Process
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
Doc. Code. OceanStor VTL6900 Technical White Paper. Issue 1.1. Date 2012-07-30. Huawei Technologies Co., Ltd.
Doc. Code OceanStor VTL6900 Technical White Paper Issue 1.1 Date 2012-07-30 Huawei Technologies Co., Ltd. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
Common Remote Service Platform (crsp) Security Concept
Siemens Remote Support Services Common Remote Service Platform (crsp) Security Concept White Paper April 2013 1 Contents Siemens AG, Sector Industry, Industry Automation, Automation Systems This entry
McAfee Web Gateway 7.4.1
Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this
Log Audit Ensuring Behavior Compliance Secoway elog System
As organizations strengthen informatization construction, their application systems (service systems, operating systems, databases, and Web servers), security devices (firewalls and the UTM, IPS, IDS,
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou
3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University
United Security Technology White Paper
United Security Technology White Paper United Security Technology White Paper 1 Challenges...6 1.1 Security Problems Caused by Mobile Communication...6 1.2 Security Fragmentation Problems...8 2 United
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
OceanStor 9000 InfoProtector Technical White Paper. Issue 01. Date 2014-02-13 HUAWEI TECHNOLOGIES CO., LTD.
OceanStor 9000 InfoProtector Technical White Paper Issue 01 Date 2014-02-13 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may
Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard
Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Corporate Policies & Procedures Section 1: General Administration Document
Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity
NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Data Security and Governance with Enterprise Enabler
Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
DiamondStream Data Security Policy Summary
DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Course Title: Penetration Testing: Network Threat Testing, 1st Edition
Course Title: Penetration Testing: Network Threat Testing, 1st Edition Page 1 of 6 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
Avaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
System Security Guide for Snare Server v7.0
System Security Guide for Snare Server v7.0 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for direct,
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY
REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY Babul K Ladhe 1, Akshay R Jaisingpure 2, Pratik S Godbole 3, Dipti S Khode 4 1 B.E Third Year, Information Technology JDIET, Yavatmal [email protected]
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
COB 302 Management Information System (Lesson 8)
COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this
